Podcast
Questions and Answers
What is the main purpose of network security?
What is the main purpose of network security?
Which of the following describes a firewall?
Which of the following describes a firewall?
What is one potential drawback of using a firewall?
What is one potential drawback of using a firewall?
What form of authentication can be used to improve network security?
What form of authentication can be used to improve network security?
Signup and view all the answers
What do packet filtering firewalls primarily do?
What do packet filtering firewalls primarily do?
Signup and view all the answers
Which of the following is NOT a common security attack mentioned?
Which of the following is NOT a common security attack mentioned?
Signup and view all the answers
Which statement about firewalls is incorrect?
Which statement about firewalls is incorrect?
Signup and view all the answers
How is the reliability of resource availability typically guaranteed in a secure network?
How is the reliability of resource availability typically guaranteed in a secure network?
Signup and view all the answers
What is the purpose of well-known port numbers?
What is the purpose of well-known port numbers?
Signup and view all the answers
Which of the following protocols uses TCP port 22?
Which of the following protocols uses TCP port 22?
Signup and view all the answers
What type of attack is characterized by overloading a server to make a network service unusable?
What type of attack is characterized by overloading a server to make a network service unusable?
Signup and view all the answers
Which of the following best describes a dictionary attack?
Which of the following best describes a dictionary attack?
Signup and view all the answers
What is a key characteristic of packet sniffing?
What is a key characteristic of packet sniffing?
Signup and view all the answers
Which protocol is commonly used to secure HTTP communications?
Which protocol is commonly used to secure HTTP communications?
Signup and view all the answers
What might be a common tactic employed in social engineering attacks?
What might be a common tactic employed in social engineering attacks?
Signup and view all the answers
Which service commonly uses TCP port 80?
Which service commonly uses TCP port 80?
Signup and view all the answers
What is the primary function of well-known port numbers in a network?
What is the primary function of well-known port numbers in a network?
Signup and view all the answers
Which of the following ports is associated with the Hypertext Transfer Protocol (HTTP)?
Which of the following ports is associated with the Hypertext Transfer Protocol (HTTP)?
Signup and view all the answers
What is a characteristic of a denial of service attack?
What is a characteristic of a denial of service attack?
Signup and view all the answers
How does packet sniffing primarily compromise network security?
How does packet sniffing primarily compromise network security?
Signup and view all the answers
Which of the following protocols is commonly used to secure IP communications?
Which of the following protocols is commonly used to secure IP communications?
Signup and view all the answers
What role do Intrusion Detection Systems (IDS) serve in network security?
What role do Intrusion Detection Systems (IDS) serve in network security?
Signup and view all the answers
Which port is typically used for Secure Shell (SSH) connections?
Which port is typically used for Secure Shell (SSH) connections?
Signup and view all the answers
What does a dictionary attack exploit to gain unauthorized access?
What does a dictionary attack exploit to gain unauthorized access?
Signup and view all the answers
What is a potential threat posed by social engineering?
What is a potential threat posed by social engineering?
Signup and view all the answers
Which type of attack relies on creating false IP packets that rely on destination address alone?
Which type of attack relies on creating false IP packets that rely on destination address alone?
Signup and view all the answers
What is a primary concern of network security?
What is a primary concern of network security?
Signup and view all the answers
What type of firewall filters packets based on predefined rules?
What type of firewall filters packets based on predefined rules?
Signup and view all the answers
Which of the following is a primary function of firewalls?
Which of the following is a primary function of firewalls?
Signup and view all the answers
Why is it important to keep firewalls up to date?
Why is it important to keep firewalls up to date?
Signup and view all the answers
What characterizes Denial of Service (DoS) attacks?
What characterizes Denial of Service (DoS) attacks?
Signup and view all the answers
What is an example of access control in network security?
What is an example of access control in network security?
Signup and view all the answers
Which system might incorporate a built-in firewall function?
Which system might incorporate a built-in firewall function?
Signup and view all the answers
What type of information should be protected by network security measures?
What type of information should be protected by network security measures?
Signup and view all the answers
What is one potential risk of having only one point of access into a network as provided by a firewall?
What is one potential risk of having only one point of access into a network as provided by a firewall?
Signup and view all the answers
Which of the following best describes packet sniffing?
Which of the following best describes packet sniffing?
Signup and view all the answers
What is a key benefit of using firewalls in a network?
What is a key benefit of using firewalls in a network?
Signup and view all the answers
Which of the following is a drawback of firewalls in network security?
Which of the following is a drawback of firewalls in network security?
Signup and view all the answers
What differentiates packet filtering firewalls from other types?
What differentiates packet filtering firewalls from other types?
Signup and view all the answers
Which of these is primarily targeted in Social Engineering attacks?
Which of these is primarily targeted in Social Engineering attacks?
Signup and view all the answers
What is a common characteristic of Denial of Service (DoS) attacks?
What is a common characteristic of Denial of Service (DoS) attacks?
Signup and view all the answers
What is the role of intrusion detection systems (IDS) in network security?
What is the role of intrusion detection systems (IDS) in network security?
Signup and view all the answers
How do firewalls maintain their effectiveness over time?
How do firewalls maintain their effectiveness over time?
Signup and view all the answers
Which communication protocols typically rely on port numbers for their operation?
Which communication protocols typically rely on port numbers for their operation?
Signup and view all the answers
What type of attack involves monitoring network traffic to capture unencrypted data, such as passwords?
What type of attack involves monitoring network traffic to capture unencrypted data, such as passwords?
Signup and view all the answers
Which of the following port numbers is associated with the Post Office Protocol (POP3)?
Which of the following port numbers is associated with the Post Office Protocol (POP3)?
Signup and view all the answers
What is the main purpose of a Denial of Service (DoS) attack?
What is the main purpose of a Denial of Service (DoS) attack?
Signup and view all the answers
Which protocol is commonly associated with TCP port 443 for secure web communications?
Which protocol is commonly associated with TCP port 443 for secure web communications?
Signup and view all the answers
Which type of social engineering involves tricking individuals into revealing sensitive information?
Which type of social engineering involves tricking individuals into revealing sensitive information?
Signup and view all the answers
What can be a consequence of a successful dictionary attack?
What can be a consequence of a successful dictionary attack?
Signup and view all the answers
What is one method for securing data transmitted over the Internet to prevent packet sniffing?
What is one method for securing data transmitted over the Internet to prevent packet sniffing?
Signup and view all the answers
What type of monitoring system is designed to detect suspicious activity on a network?
What type of monitoring system is designed to detect suspicious activity on a network?
Signup and view all the answers
Study Notes
International & Access Foundation Programmes
- Computer Science Module, Semester 2, Part 5: Networks - Network Security
Overview
- What is network security?
- Why is network security needed?
- Who is vulnerable?
- Common security attacks and countermeasures
- Firewalls & Intrusion Detection Systems
- Denial of Service Attacks
- TCP Attacks (Spoofing)
- Packet Sniffing
- Social Engineering
Why do we need security?
- Protect vital information while allowing access to those who need it
- Trade secrets, medical records, personal data etc.
- Provide authentication and access control for resources
- Login, Passwords, Biometrics
- Guarantee availability of resources
- Uptime 99.995% reliability
Firewalls
-
Basic problem: many network applications and protocols have security problems that are fixed over time
-
Difficult for users to keep up with changes and keep host secure
-
Solution: Administrators limit access to end hosts by using a firewall
- Firewall is kept up-to-date by administrators
-
Firewall is like a castle with a drawbridge: only one point of access into the network
- This can have positives and negatives
- Can be hardware or software
- Some routers come with firewall functionality
- Unix systems, Windows XP/7/8 and Mac OS X have built-in software firewalls
-
Diagram shows the firewall's position between the Internet and Intranet, with a DMZ (Demilitarized Zone) in between for servers.
- Data flows from Internet, through a Firewall, then to the DMZ, and to the Intranet.
-
Used to filter packets based on rules
-
These are called packet filtering firewalls
-
There are other types too, but they will not be discussed.
-
Windows 7 default installation shows specific open ports.
Ports
- In the internet protocol suite, a port is an endpoint of communication in an operating system
- 1024 well-known port numbers are reserved to identify specific service types on a host
- A port is always associated with an IP address of a host
- Examples include:
http://www.example.com:8080
,http://72.56.123.233:80/
- List of registered ports
Typical TCP Ports
- 21: File Transfer Protocol (FTP)
- 22: Secure Shell (SSH)
- 23: Telnet remote login service
- 25: Simple Mail Transfer Protocol (SMTP)
- 53: Domain Name System (DNS) service
- 80: Hypertext Transfer Protocol (HTTP) – used in the World Wide Web
- 110: Post Office Protocol (POP3)
- 119: Network News Transfer Protocol (NNTP)
- 123: Network Time Protocol (NTP)
- 143: Internet Message Access Protocol (IMAP)
- 161: Simple Network Management Protocol (SNMP)
- 194: Internet Relay Chat (IRC)
- 443: HTTP Secure (HTTPS)
Types of Attack
- Intrusion Detection
- Used to monitor for "suspicious activity" on a network.
- Based on well-known patterns of behavior.
- Dictionary Attack - Brute Force
- Dictionary attack on passwords.
- Denial of Service
- Makes a network service unusable by overloading the server or network.
- TCP Attacks
- Create IP packets and routers process them based on destination address alone
- End hosts may lie about other fields which do not affect delivery
- Attacker can insert malicious data into the TCP stream, and the recipient will believe it came from the original source.
- Packet Sniffing
- Affects any broadcast-based medium (cable, wifi, etc.)
- A host listens to the data (plain text data – passwords).
- Solution: encrypt the data using Secure Sockets Layer (SSL) for https addresses
- Web browsers know how to trust HTTPS websites based on certificate authorities.
- IPSec - Internet Protocol Security (a protocol suite for securing Internet communications by authenticating and encrypting IP packets).
- Social Engineering
- People can be just as dangerous as unprotected computer systems.
- People can be lied to, manipulated, bribed, threatened, harmed, tortured, etc. to give up valuable information.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Explore the essential concepts of Network Security in this Computer Science Module. Understand the importance of safeguarding vital information from various attacks and learn about various security measures like firewalls and intrusion detection systems. This quiz also covers vulnerabilities and strategies for maintaining resource availability.